Dynamic spatial index for efficient query processing on the cloud
暂无分享,去创建一个
[1] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[2] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[3] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[4] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[5] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.
[6] Christos Faloutsos,et al. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve , 2001, IEEE Trans. Knowl. Data Eng..
[7] Jae-Woo Chang,et al. Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data , 2014, 2014 International Conference on Big Data and Smart Computing (BIGCOMP).
[8] Jae-Woo Chang,et al. Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data , 2016, Data Knowl. Eng..
[9] YangJun,et al. New order preserving encryption model for outsourced databases in cloud environments , 2016 .
[10] Jianliang Xu,et al. Processing private queries over untrusted data cloud through privacy homomorphism , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[11] Keke Chen,et al. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.
[12] Ibrahim Kamel,et al. Enhancing Confidentiality and Privacy of Outsourced Spatial Data , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[13] Haixun Wang,et al. A query integrity assurance scheme for accessing outsourced spatial databases , 2012, GeoInformatica.
[14] Ilsun You,et al. New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..
[15] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[16] Vishal R. Shinde,et al. Outsourced Similarity Search on Metric Data Assets , 2014 .
[17] Murat Kantarcioglu,et al. Secure multidimensional range queries over outsourced data , 2012, The VLDB Journal.
[18] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[19] Lynn Margaret Batten,et al. Prevention of Information Harvesting in a Cloud Services Environment , 2011, CLOSER.
[20] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[21] Peng Wang,et al. Secure and efficient range queries on outsourced databases using Rp-trees , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[22] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[23] Peter J. H. King,et al. Querying multi-dimensional data indexed using the Hilbert space-filling curve , 2001, SGMD.
[24] Haitao Wang,et al. Geometric Range Search on Encrypted Spatial Data , 2016, IEEE Transactions on Information Forensics and Security.
[25] Stefanos Georgiou,et al. Exploiting Network-Topology Awareness for VM Placement in IaaS Clouds , 2013, 2013 International Conference on Cloud and Green Computing.
[26] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[27] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[28] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[29] Haixun Wang,et al. Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases , 2009, SSTD.
[30] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[31] Panos Kalnis,et al. Enabling search services on outsourced private spatial data , 2009, The VLDB Journal.
[32] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[33] Christos Faloutsos,et al. Hilbert R-tree: An Improved R-tree using Fractals , 1994, VLDB.
[34] Kuo-Liang Chung,et al. Space-filling approach for fast window query on compressed images , 2000, IEEE Trans. Image Process..